Search results for "INTERNET OF THINGS"
showing 10 items of 150 documents
Experimental trade-offs between different strategies for multihop communications evaluated over real deployments of wireless sensor network for envir…
2018
Although much work has been done since wireless sensor networks appeared, there is not a great deal of information available on real deployments that incorporate basic features associated with these networks, in particular multihop routing and long lifetimes features. In this article, an environmental monitoring application (Internet of Things oriented) is described, where temperature and relative humidity samples are taken by each mote at a rate of 2 samples/min and sent to a sink using multihop routing. Our goal is to analyse the different strategies to gather the information from the different motes in this context. The trade-offs between ‘sending always’ and ‘buffering locally’ approac…
Experimental Analysis of IoT Networks Based on LoRa/LoRaWAN under Indoor and Outdoor EnvirMedusonments: Performance and Limitations
2021
Nowadays, Internet of Things (IoT) has multiple applications in different fields. This concept allows physical devices to connect to the internet in order to establish a strong infrastructure that facilitates many device control and monitoring tasks. Low Power Wide Area (LPWA) communication protocols become widely used for IoT networks because of their low power consumption and the broad range communication. LPWA enables devices to transmit small amounts of data in a long distance. Among LPWA protocols, LoRa technology gained a lot of interest recently from the research community and many companies. LoRa is a long range and low power wireless communication technology regulated by the LoRaWA…
Discovery privacy threats via device de-anonymization in LoRaWAN
2021
LoRaWAN (Long Range WAN) is one of the well-known emerging technologies for the Internet of Things (IoT). Many IoT applications involve simple devices that transmit their data toward network gateways or access points that, in their turn, redirect data to application servers. While several security issues have been addressed in the LoRaWAN specification v1.1, there are still some aspects that may undermine privacy and security of the interconnected IoT devices. In this paper, we tackle a privacy aspect related to LoRaWAN device identity. The proposed approach, by monitoring the network traffic in LoRaWAN, is able to derive, in a probabilistic way, the unique identifier of the IoT device from…
Efficiency of temporal sensor data compression methods to reduce LoRa-based sensor node energy consumption
2022
Purpose Minimizing the energy consumption in a wireless sensor node is important for lengthening the lifetime of a battery. Radio transmission is the most energy-consuming task in a wireless sensor node, and by compressing the sensor data in the online mode, it is possible to reduce the number of transmission periods. This study aims to demonstrate that temporal compression methods present an effective method for lengthening the lifetime of a battery-powered wireless sensor node. Design/methodology/approach In this study, the energy consumption of LoRa-based sensor node was evaluated and measured. The experiments were conducted with different LoRaWAN data rate parameters, with and without …
Advanced Monitoring Systems Based on Battery-Less Asset Tracking Modules Energized through RF Wireless Power Transfer
2020
Asset tracking involving accurate location and transportation data is highly suited to wireless sensor networks (WSNs) featuring battery-less nodes that can be deployed in virtually any environment and require little or no maintenance. In response to the growing demand for advanced battery-less sensor tag solutions, this article presents a system for identifying and monitoring the speeds of assets in a WSN with battery-less tags that receive all their operating energy through radio frequency (RF) wireless power transfer (WPT) architecture, and a unique measurement approach to generate time-domain speed readouts. The assessment includes performance characteristics and key features of a syste…
Security and Privacy in Wireless IoT
2018
The 13 articles in this special section focus on security and privacy in wireless Internet of Things (IoT). IoT is a paradigm that involves networked physical objects with embedded technologies to collect, communicate, sense, and interact with the external environment through wireless or wired connections. With rapid advancements in IoT technology, the number of IoT devices is expected to surpass 50 billion by 2020, which has also drawn the attention of attackers who seek to exploit the merits of this new technology for their own benefits. There are many potential security and privacy threats to IoT, such as attacks against IoT systems and unauthorized access to private information of end u…
Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks
2015
Internet of Things (IoT) devices are rapidly becoming ubiquitous while IoT services are becoming pervasive. Their success has not gone unnoticed and the number of threats and attacks against IoT devices and services are on the increase as well. Cyber-attacks are not new to IoT, but as IoT will be deeply interwoven in our lives and societies, it is becoming necessary to step up and take cyber defense seriously. Hence, there is a real need to secure IoT, which has consequently resulted in a need to comprehensively understand the threats and attacks on IoT infrastructure. This paper is an attempt to classify threat types, besides analyze and characterize intruders and attacks facing IoT device…
A Self-Powered Long-range Wireless IoT Device based on LoRaWAN
2020
In this article, we propose a self-powered long-range wireless Internet-of-Things (IoT) device based on Long Range Wide Area Network (LoRaWAN) with various sensing capabilities. The nodes are designed based on ambient energy harvesting in such a way that these are self-sustainable throughout the components’ lifespan. Also, these nodes can be deployed on a large scale and are maintenance-free. In addition, these nodes can be deployed in remote places where the accessibility is limited, and maintenance is difficult. The wireless sensor nodes can be deployed both in indoor and outdoor environments with sufficient light levels for the solar panel, such as indoor lights in the indoor environment…
Strategies and Techniques for Powering Wireless Sensor Nodes through Energy Harvesting and Wireless Power Transfer
2019
The continuous development of internet of things (IoT) infrastructure and applications is paving the way for advanced and innovative ideas and solutions, some of which are pushing the limits of state-of-the-art technology. The increasing demand for Wireless Sensor Nodes (WSNs) able to collect and transmit data through wireless communication channels, while often positioned in locations that are difficult to access, is driving research into innovative solutions involving energy harvesting (EH) and wireless power transfer (WPT) to eventually allow battery-free sensor nodes. Due to the pervasiveness of radio frequency (RF) energy, RF EH and WPT are key technologies with the potential to power …
Testing wearable IoT applications through sensor virtualization
2020
The development of distributed IoT applications requires the integration of data provided by different sensors embedded in multiple devices. As an example, an application for health monitoring in an assisted living scenario may include several wearable and fixed nodes each carrying different sensors and running specific code. Verifying that the application is properly working according to the specifications requires assessing that the code of each node behaves consistently in all the possible use cases. Tests involving sensor data may be difficult or costly to replicate realistically and this could also slow down the development of the application in its early stages. In this paper we intro…